SP 800-137. Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations

  • Authors:
  • Kelley L. Dempsey;Nirali Shah Chawla;L. Arnold Johnson;Ronald Johnston;Alicia Clay Jones;Angela D. Orebaugh;Matthew A. Scholl;Kevin M. Stine

  • Affiliations:
  • National Institute of Standards and Technology;PricewaterhouseCoopers LLP;National Institute of Standards and Technology;Department of Defense;Booz Allen Hamilton;Booz Allen Hamilton;National Institute of Standards and Technology;National Institute of Standards and Technology

  • Venue:
  • SP 800-137. Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The purpose of this guideline is to assist organizations in the development of a continuous monitoring strategy and the implementation of a continuous monitoring program providing visibility into organizational assets, awareness of threats and vulnerabilities, and visibility into the effectiveness of deployed security controls. It provides ongoing assurance that planned and implemented security controls are aligned with organizational risk tolerance as well as the information needed to respond to risk in a timely manner should observations indicate that the security controls are inadequate.